Gem-Security / gem-environment-assessmentLinks
Utilities for assessing cloud environments
☆18Updated last year
Alternatives and similar repositories for gem-environment-assessment
Users that are interested in gem-environment-assessment are comparing it to the libraries listed below
Sorting:
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆997Updated last week
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆613Updated this week
- Sample pipeline demo highlighting how to integrate Falcon Container Sensor into ECS Fargate Workloads☆11Updated 8 months ago
- Protect your data in AWS S3 with DataCop!☆14Updated 10 months ago
- ☆1,001Updated 7 months ago
- AWS CloudSaga - Simulate security events in AWS☆463Updated this week
- Bare minimum AWS Security Alerting and Secure by default Configuration☆506Updated 2 months ago
- The AWS Secure Environment Accelerator is a tool designed to help deploy and operate secure multi-account, multi-region AWS environments …☆762Updated this week
- Cloudsplaining is an AWS IAM Security Assessment tool that identifies violations of least privilege and generates a risk-prioritized repo…☆2,104Updated this week
- AWS IAM linting library☆1,090Updated last month
- Multi-threaded AWS inventory collection tool with a focus on security-relevant resources and metadata.☆548Updated last week
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆431Updated 5 months ago
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆556Updated last month
- A tool for quickly evaluating IAM permissions in AWS.☆1,505Updated 11 months ago
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆248Updated last week
- The easiest way to access AWS.☆1,364Updated 2 months ago
- IAM Least Privilege Policy Generator☆2,101Updated 2 weeks ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆399Updated last month
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆258Updated this week
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,063Updated 3 weeks ago
- Command Line Interface tool for Cloud Intelligence Dashboards deployment☆464Updated this week
- Open-source temporary elevated access solution for AWS IAM Identity Center.☆386Updated 2 weeks ago
- Runs checks to see if an EKS cluster follows EKS Best Practices.☆919Updated last month
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆592Updated 3 weeks ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆900Updated 3 years ago
- aws2tf - automates the importing of existing AWS resources into Terraform and outputs the Terraform HCL code.☆670Updated last week
- High availability implementation of AWS NAT instances.☆1,164Updated this week
- [MAMIP] Monitor AWS Managed IAM Policies Changes☆488Updated this week
- A solution for collecting, correlating and visualizing multiple types of logs to help investigate security incidents.☆626Updated last month
- Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy☆3,277Updated last week